#VU92058 Improper error handling in Linux kernel


Published: 2024-06-13

Vulnerability identifier: #VU92058

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26814

CWE-ID: CWE-388

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the vfio_fsl_mc_set_irq_trigger() function in drivers/vfio/fsl-mc/vfio_fsl_mc_intr.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417
http://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267
http://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d
http://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9
http://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012
http://git.kernel.org/stable/c/250219c6a556f8c69c5910fca05a59037e24147d
http://git.kernel.org/stable/c/a563fc18583ca4f42e2fdd0c70c7c618288e7ede


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability